This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2
Big Island, Hawaii
January 06-January 09
ISBN: 0-7695-1874-5
David P. Biros, Air Force Institute of Technology
Gregory Fields, Air Force Communications Agency
Gregg Gunsch, Air Force Institute of Technology
The modern military command and control (C2) center collects a massive amount of information that is both complex and contradictory. The amount of collected information is often more than can be effectively and efficiently understood by humans. Therefore, today's decision-makers have become reliant upon information systems to filter through the information and fuse that information into a computer representation of the battle space. The degree of reliance placed in these systems by the decision-makers suggests a significant level of trust. Trust theories and models are rich in the literature, but few have been developed for the human-computer trust relationship. A recent model of trust was found that was both broad in scope and supportive of human-computer trust theories. This model was used to explore the decision-maker's trust in information systems in a C2 environment. Given the vulnerability of information systems to information security incidents such as hacking and data manipulation, this study set out to examine if the presence of such incidents would effect the decision-makers trusting behavior. This study also examined if the use of such external safeguards, such as the Computer Emergency Response Teams (CERT) and the Network Risk Assessment Certifications, would affect the decision-maker. Two laboratory experiments were conducted with military personnel using a high-fidelity C2. The findings from both experiments suggest that the presence of information security incidents in a fast-paced C2 environment have no effect on the decision-makers trusting behavior. Decision makers continued to trust information systems even though information security incidents occurred.
Citation:
David P. Biros, Gregory Fields, Gregg Gunsch, "The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment," hicss, vol. 2, pp.62b, 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2, 2003
Usage of this product signifies your acceptance of the Terms of Use.